An entropy-view secure multiparty computation protocol based on semi-honest model Y Luo, Y Chen, T Li, Y Wang, Y Yang, X Yu Journal of Organizational and End User Computing (JOEUC) 34 (10), 1-17, 2022 | 7 | 2022 |
VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme Y Tang, Y Chen, Y Luo, S Dong, T Li Applied Sciences 13 (7), 4166, 2023 | 3 | 2023 |
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption Y Luo, Y Chen, T Li, C Tan, H Dou Journal of Cloud Computing 13 (1), 22, 2024 | 2 | 2024 |
Using information entropy to analyze secure multi-party computation protocol Y Luo, Y Chen, T Li, Y Wang, Y Yang 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2021 | 2 | 2021 |
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems Z He, Y Chen, Y Luo, L Zhang, Y Tang Entropy 26 (1), 45, 2023 | 1 | 2023 |
Data Rights Confirmation Scheme Based on Auditable Ciphertext CP-ABE in the Cloud Storage Environment L Zhang, Y Chen, Y Luo, Z He, T Li Applied Sciences 13 (7), 4355, 2023 | 1 | 2023 |
MDIFL: Robust federated learning based on malicious detection and incentives R Wu, Y Chen, C Tan, Y Luo Applied Sciences 13 (5), 2793, 2023 | 1 | 2023 |
Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption Y Luo, Y Chen, H Dou, C Tan, H Zhou Information Processing & Management 61 (5), 103789, 2024 | | 2024 |
Cross-chain asset trading scheme for notaries based on edge cloud storage L Chen, Y Chen, C Tan, Y Luo, H Dou, Y Yang Journal of Cloud Computing 13 (1), 90, 2024 | | 2024 |
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model C Shu, Y Chen, C Tan, Y Luo, H Dou Journal of Cloud Computing 13 (1), 4, 2024 | | 2024 |
A Blockchain of Blockchains Structure Based on Asset Trading Scheme S Huang, Y Chen, C Tan, H Dou, Y Luo, Y Yang 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain L Yuan, Y Yang, C Tan, H Dou, Y Luo, Y Chen 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
Adversarial Attack Method Based on Dual-frequency Domain Transformation M Xiong, Y Chen, H Dou, Y Luo, C Tan, Y Zhang 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
Robust Object Detection Based on a Comparative Learning Perspective H Yang, Y Chen, H Dou, Y Luo, C Tan, Y Zhang 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
Communication-Efficient Federated Learning with Sparsity and Quantization Z Long, Y Chen, H Dou, Y Luo, C Tan, Y Sun 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
A High Capacity Combined Carrier Steganography Without Embedding Image Y Zhang, Y Chen, H Dou, Y Luo, C Tan, M Xiong 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism L Chen, Y Chen, C Tan, H Dou, Y Luo, P Chen 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism R Shi, Y Chen, C Tan, Y Luo, T Li Journal of Cloud Computing 12 (1), 117, 2023 | | 2023 |
A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption Y Luo, Y Chen, T Li, Y Wang 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE …, 2022 | | 2022 |